CSCD 330 Network Programming Spring 2017

Similar documents
CSCD 330 Network Programming Spring 2018

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IP - The Internet Protocol

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

Internet Technology 3/23/2016

CSC 401 Data and Computer Communications Networks

internet technologies and standards

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Router Architecture Overview

CS118 Discussion, Week 6. Taqi

Information Network Systems The network layer. Stephan Sigg

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

Networking Potpourri: Plug-n-Play, Next Gen

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

Chapter 4 Network Layer: The Data Plane

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

Lecture 8 Network Layer: Logical addressing

CSCE 463/612 Networks and Distributed Processing Spring 2018

Chapter 4: Network Layer

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

ECE 158A: Lecture 7. Fall 2015

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

IP Addresses. IP Addresses

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

IPv4. Christian Grothoff.

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Network layer: Overview. Network Layer Functions

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Internetworking Part 2

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Computer Networking Introduction

TSIN02 - Internetworking

Chapter 4 Network Layer

Network Layer/IP Protocols

Master Course Computer Networks IN2097

RSC Part II: Network Layer 3. IP addressing (2nd part)

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

NETWORK LAYER: IP Addressing

Vorlesung Kommunikationsnetze

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Instructor: Nicholas DeMarinis

Network Layer PREPARED BY AHMED ABDEL-RAOUF

CSEP 561 Internetworking. David Wetherall

Network Layer: outline

CS 520: Network Architecture I Winter Lecture 11: IP Address Conservation

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

COMP/ELEC 429/556 Introduction to Computer Networks

COMP211 Chapter 4 Network Layer: The Data Plane

End-to-End Communication

Introduction to Internetworking

Chapter 4: network layer

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

A few notes. The following slides are NOT from the online curriculum. However, they do cover the same topics using different examples.

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Communication Systems DHCP

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

CSCI Computer Networks Fall 2016

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Lecture 8. Network Layer (cont d) Network Layer 1-1

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

The Internet Protocol (IP)

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay

Network Layer: Internet Protocol

Chapter 18. Introduction to Network Layer

EEC-484/584 Computer Networks

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Internet Routing Protocols, DHCP, and NAT

internet technologies and standards

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

1 Connectionless Routing

Network Layer: Control/data plane, addressing, routers

Lecture 17: Network Layer Addressing, Control Plane, and Routing

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 10: IP Routing and Addressing Extensions

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Layering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Lecture 1: Introduction

Introduction to Internetworking

Top-Down Network Design

Internet Addresses (You should read Chapter 4 in Forouzan)

Chapter 4 Network Layer

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Transcription:

CSCD 330 Network Programming Spring 2017 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007 1

Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format Fragmentation IPv4 addressing 4.5 Routing algorithms Link state Distance Vector Hierarchical routing 4.6 Routing in the Internet RIP OSPF BGP 4.7 Broadcast and multicast routing 2

Introduction Last time, began the network layer Provides a best effort service most of the time Alternate model - virtual circuit like ATM, MPLS tries to create a virtual circuit on top of the best effort datagram environment Today, IP addressing 3

IP Version 4 Header IPv4 Frame Header Designed to handle addressing and routing challenges Think about trying to route through a network where Physical network varies different capacity of links Maximize efficiency means minimize redundancy Account for both uncertain and certain delivery Handle errors Explains the IP packet header 4

IPv4 Header Fields Explained First, header length is normally 20 bytes, has it own field Version IPv4 or IPv6 - will contain 4 or 6 Header Length Length in 32 bits (4 bytes) Most of the time its 5 for 20 bytes of header, but it can vary due to options 5

IPv4 Header Type of Service Application dependent applications can say to treat packets differently Length Maximum length packet in bytes 16 bits so, packets can be 65,535 bytes long 6

IPv4 Header Time to Live (TTL) Used to be a time, now its more a hop count don t want packets circulating through network forever - Routers decrease this by 1, default 64 Protocol Upper layer protocol, TCP or UDP or ICMP Checksum Only of the IP Header! Computed by adding header as 16 bit words using ones complement arithmetic and then taking the one s complement of the result, Routers compute it too. At destination, compare it to value stored in this field and if different discard the packet Line Two Deals with Fragments Fragment offset 13 bits, in bytes/8 Fragment Identification 16 bits, identifier set by sender Flags 3 bits, indicates fragments 7

IPv4 Header Source Address 32 bits long Destination Address 32 bits long Gives us 2 32 addresses or over 4 billion addresses Options field used sometimes 8

Fragmentation One design decision helped Internet remain flexible Able to accommodate multiple network technologies Packet Fragmentation Packets can be divided so can pass through links of different sizes Some typical maximum packet sizes Ethernet 1500 bytes long FDDI 4500 bytes long Point to point (PPP) 532 bytes long 9

Fragmentation Every network sets its MTU Maximum Transmission Unit Largest Frame Size of Data link layer Previous slides shows -> MTU varies with link type IP packets need to adjust to that frame size Think of squeezing packets through different sized pipes If MTU along the way, is smaller than IP packet size on your network Datagram must fit within payload of link layer frame Fragmentation occurs in router. when datagram size > than network MTU it must travel over 10

Example Fragmentation Links MTU's Ethernet, Networks 1 and 2-1500 FDDI, Network 3 4500 PPP, Network 4-532 H1 1500 bytes 1500 bytes H8 H1 sends datagram to H8, 1400 bytes data and 20 bytes header. 1420 total Do we Need to fragment? 4500 bytes 532 bytes 11

Fragmentation: Example Network Ethernet R1 and FDDI R2 No fragmentation needed Why is that? PPP R3 Fragmentation is needed Ethernet FDDI P-to-P Ethernet Routers don t reassemble packets Host does packet reassembly 12

Bytes 1400 512 512 Original Packet Example of fragment 512 bytes of data + 20 bytes of header, why this size? Flag = 1 for more fragments follow Offset is in groups of 8 bytes 512/8 = 64 376 Offset = 2 x 64 = 128 Flag = 0, no more fragments 13

Fragments Reassembly IF all fragments don t arrive, What do you do? Discards ones that have arrived Packet will need to be resent Consequently, fragments can waste resources Not recommended!!! Hosts encouraged to perform path MTU discovery Avoid fragments if possible 14

Fragmentation Discouraged To avoid fragmentation, hosts commonly use path MTU discovery to find smallest MTU along path Path MTU discovery involves sending various size datagrams until they do not require fragmentation along the path Most links use MTU >= 1500 bytes today Also a nice tool to check, TracePath, http://www.subnetonline.com/pages/network-tools/onlinetracepath.php Nice short summary of MTU Path discovery http://packetlife.net/blog/2008/aug/18/path-mtu-discovery/ 15

Network Addressing

Addressing Global Level Look at how IP level performs addressing of packets... Ethernet/Link Layer address scheme is flat MAC (Media Access Control) address doesn t have much structure or hierarchy 00:13:02:BA:43:56 Each MAC address is burnt into an individual Network card including wireless When you connect to a network, MAC address operates at the link layer and IP address operates at the Network layer

Addressing Global Level IP address is divided into Two Parts Host and network Addresses are also hierarchical Allows network to scale Routing tables only need network part Local delivery inside a network doesn t involve router at all and needs the host part

Forwarding in General Forwarding Datagrams Source host sends datagram to Destination host Passes through possibly several routers Router asks, Is Source on Same Network as Destination? Compares network part of destination with network part of address for each of its interfaces If match, destination on same physical network» Packet can be delivered If no match, sends datagram to next router» Router chosen is next hop router» Found via forwarding table 19

IP Addresses 20

IP Addressing An Evolution IP Addresses were Grouped together to form networks Didn t happen by accident Evolving process First attempt Divide addresses into rigid categories Then, more flexible way of addressing Subnetting Still working on it IPV6 is next 21

IP Addresses RFC 1166 Each host on Internet has unique 32 bit IP address Each address has two parts: netid and hostid hostid simply the number of the host on that network netid unique Network part of the IP address is Administered by American Registry for Internet Numbers (ARIN) or Reseaux IP Europeens (RIPE) or Asia Pacific Network Information Centre (APNIC) Each host has Separate IP address Dotted-Decimal Notation IP address of 10000000 10000111 01000100 00000101 is 128. 135. 68. 5 Called Dotted-decimal notation 22 Each part is an octet, 8 bits

Classful Addressing Classful addressing, formally adopted as part of the Internet Protocol (IP) in RFC 791, 1981 Internet's first major addressing scheme There were three address classes to chose from: A, B, or C, corresponding to 8-bit, 16-bit, or 24-bit network prefixes No other prefix lengths were allowed Not very flexible to needs of organizations 23

Classful Addresses Class A 1 bit 7 bits 24 bits Starts with 0 0 netid hostid 128 networks with up to ~16 million hosts 1.0.0.0 to 127.255.255.255 Class B Starts with 2 1 0 14 bits 16 bits netid hostid 16,384 networks with up to ~65,000 hosts Class C Starts with 3 2 bits 3 bits 21 bits 8 bits 1 1 0 netid hostid ~2 million networks with up to 256 hosts 128.0.0.0 to 191.255.255.255 192.0.0.0 to 223.255.255.255

Classful Addresses Notes Rigid allocation of networks First 3 bits were fixed, routers easily could tell type of network by first three bits Inverse relationship between network number and number of hosts on network As network number grows, host number shrinks Has to do with how many bits left over for hosts

Classful Address Examples Upon installing a new Internet connection, network engineer Requested Class A, B, or C network, depending on expected size of installed network For example U.S. Department of Defense Large network, got a Class A network University of Maryland, Mid-sized network, got a Class B network Small consulting firm Small network, got a Class C network 26

Problems with Classful Addressing Soon became apparent that classful addressing was inadequate For example, a reasonably sized company Class C, with 254 IP addresses, would be too small Next larger choice would be a Class B, providing 65,534 IP addresses, too big Unlikely that thousands of hosts would be located on a single Ethernet LAN How could we fix this? 27

Subnetting to the Rescue Many network engineers wanted Ability to take Class B and break its 65,534 addresses into 100-200 smaller networks of 200-300 addresses each Smaller networks became known as Subnets, and a standard scheme called subnetting was formalized in RFC 950 Was in 1985 around 30 + years ago http://www.faqs.org/rfcs/rfc950.html 28

Subnets and Subnet Masks What does subnetting do? Subnetting splits host field Subnet + host fields, creates a three-part address Network + Subnet + host Network field remains unchanged, You start with the Classful classification, then borrow bits from host to make your subnets 29

Subnets and Subnet Masks When subnet created, engineer also creates subnet mask, 32 bits long, dotted decimal format, like IP address Purpose: Lets routers identify portion IP address that's related to network Each bit is either 1 to identify bit positions in the network and subnet fields, or 0 to identify bit positions in host field Then, the mask is AND'd with IP Address 255 = What is this value in binary? 11111111 by the way 30

Subnet Mask Want only network portion of IP address Host part will be zero'd out Routers only care about network part IP Address Mask then, is 1's for the network part including subnet 0's for the host part See some examples...

Example: Subnet Mask Example 1.: Say 16 bits of network address 191.70.55.130 10111111.10000110.00110111.10000010 What would the mask look like? Example 2: Say 24 bits of network address 192.168.5.10 11000000.10101000.00000101.00001010 What would the mask look like? 32

Example Apply a Subnet Mask IP Address: 187.199.127.5 Subnet mask: 255.255.255.0 Anding two together gives us Network part: 187.199.127 Network Class: B 16 bits of address Network ID: 187.199 Sub-network ID: 127 Router needs above, host is ignored by router 33

Subnetting Creates Hierarchy Idea with subnetting, take one IP address Partition it into several IP addresses Each refers to an actual physical network Assume that subnets are geographically close to one another Because distant routers only have one IP address for entire set of subnets So sending packets to these subnets through one IP number should route packets in the same general direction 34

Subnetting Creates Hierarchy Subnetting creates another level of hierarchy within IP addresses Now there is a subnet part too, since borrow bits from host Network # Subnet Host Network # Host 35

Addressing Problems not Over By 1990, the Internet was facing serious growing pains Two most severe problems were Explosion of routing table size Looming exhaustion of Class B networks Popularity of Internet triggered flood of new networks, and each network included in routing tables Routers were running out of memory, and spending too much time doing address lookup 36

Classless Interdomain Routing (CIDR) Internet Engineering Task Force (IETF), proposed Classless routing, supernetting, or CIDR This addressing scheme currently used CIDR based on subnetting Supernetting allows subnet boundary to move to the left, into network part Groups of neighboring classful networks are combined into single routing table entries Size of routing tables reduced through summarization look at that later 37

CIDR Example Created CIDR notation of networks 192.0.2.0/18 /18 says that the first 18 bits are network part of address and 14 bits are available for host addresses Network part is called prefix Example of number of bits needed for network Assume site requires network for 1000 addresses How many bits of network address gives us 1000 hosts? Answer: network is assigned block of 1024 addresses with a 22-bit long prefix See following slide for table

CIDR Prefix Size vs. Network Size CIDR Block Prefix # of Host Addresses /27 32 hosts /26 64 hosts /25 128 hosts /24 256 hosts /23 512 hosts /22 1,024 hosts /21 2,048 hosts /20 4,096 hosts /19 8,192 hosts /18 16,384 hosts /17 32,768 hosts /16 65,536 hosts /15 131,072 hosts /14 262,144 hosts /13 524,288 hosts

CIDR Network Size / Number of Network Bits CIDR networks referencing Class C networks /n = number of network bits CIDR Block Prefix # Equivalent Class C # of Host Addresses /27 1/8th of a Class C 32 hosts /26 1/4th of a Class C 64 hosts /25 1/2 of a Class C 128 hosts /24 1 Class C 256 hosts /23 2 Class C 512 hosts /22 4 Class C 1,024 hosts /21 8 Class C 2,048 hosts /20 16 Class C 4,096 hosts /19 32 Class C 8,192 hosts /18 64 Class C 16,384 hosts /17 128 Class C 32,768 hosts /16 256 Class C 65,536 hosts 40

Ipv4 Address Exhaustion Depletion of IPv4 allocation pool a concern since late 1980s when Internet started dramatic growth Anticipated shortage driving factor in creating and adopting several technologies 1.Classless Inter-Domain Routing (CIDR) methods in 1993 2. Network address translation (NAT) and 3. Internet Protocol, IPv6, in 1998

Ipv4 Address Exhaustion Predictions of exhaustion date of unallocated IANA pool seem to converge to between January 2011 and January 2012, When did we run out? Did this in Nov, 2011.

Stop here for now

CIDR and Subnetting To understand CIDR, begin with defaults for classful addressing Each Class has a DEFAULT subnet mask The picture below shows the 3 Network Classes with their respective default subnet mask: 44

Default Subnet Masks We can see in the picture below, IP Address is in Binary and Mask is 24 bits 45

Subnet Masks for CIDR Addresses To create subnetworks from standard network sizes, must borrow bits to create more networks If take bits from host, must change network mask Suppose we want to create eight subnetworks in the 192.168.18.0 address space. How many bits from the host do we need? Netmask 192. 168.18.0 11000000 10101000 00010010 00000000 11111111 11111111 11111111 00000000 46

Subnet Masks for CIDR Addresses How many bits for 8 subnets? 192. 168.18.0 11000000 10101000 00010010 00000000 11111111 11111111 11111111 11100000 How many hosts on each network? Netmask We just add 3 bits to the length of the 24-bit subnet mask. Why 3 bits? Binary, because 2 3 = 8. So now we have a /27, or 255.255.255.224, subnet mask How many hosts can we have on each network?

Subnet Masks for CIDR Addresses How many hosts? Each subnet is limited to 2 5 = 32 hosts 5 host bits left for creating host addresses But, each subnet is actually limited to 30 hosts Why is that? Need 1 address for base network address Need 1 address used as broadcast address of the subnetwork

Subnet Masks for CIDR Addresses Using the /27 mask gives us eight subnets, but we also need to know their numbers if we're going to build a network diagram or a routing table The 8 values for each 3-bit subnet are: 000 1 001 0 010 2 011 3 100 4 101 5 110 6 111 7 Then, we add the hosts to each of these networks.

Subnets for CIDR Addresses Starting subnetwork number 1 0 2 32 3 64 4 96 (64+32) 5 128 6 160 (128+32) 7 192 (128+64) 8 224 (128+64+32) Subnetworks are 192.168.18.0/27 192.168.18.32/27 192.168.18.64/27 192.168.18.96/27 192.168.18.128/27 192.168.18.160/27 192.168.18.192/27 192.168.18.224/27

Subnets for CIDR Addresses After figuring out the subnetworks base addresses, Figure out the nework mask if you haven't already done that Figure out the broadcast address for each subnetwork Figure out the range of hosts assigned to each subnetwork Worksheet on this, plus lab on subnetting Look at the links for help, end of lecture

CIDR and Subnets Created Flexible Network Sizes Helped with running out of address space Blocks of addresses can be assigned to networks as small as 32 hosts Or, over 500,000 hosts Allows for address assignments that much more closely fit an organization's specific needs A single high-level route entry can represent many lower-level routes in the global routing tables 52

Example of Subnetting How to figure out your broadcast address URLs for Subnet Calculator http://www.subnetonline.com/pages/ subnet-calculators/ip-subnet-calculator.php https://www.countryipblocks.net/identifying-thenetwork-and-broadcast-address-of-a-subnet http://www.techzoom.net/tools/network-subnetcalculator.en

Router Table Aggregation 54

CIDR Also Helped with Route Aggregation Currently, big blocks of addresses assigned to large Internet Service Providers (ISPs) Re-allocate portions of their address blocks to their customers Assigns its customers CIDR addresses from that block Customers, smaller ISPs, and in turn re-allocate portions of their address block to their users Yet global routing tables for all these networks can be represented by single route entry 55

CIDR Also Helped with Route Aggregation or Supernetting CIDR provides routing prefix aggregation, also known as supernetting Example: Sixteen Contiguous /24 Networks Aggregated and advertised as a single /20 route If first 20 bits of their network addresses match!! Two aligned contiguous /20s may then be aggregated to a /19, and so forth Allows a significant reduction in the number of routes that have to be advertised

CIDR Also Helped with Route Aggregation or Supernetting Example: Want to aggregate 8 network addresses between 131.0.0.0/16 and 131.7.0.0 /16 Need subnet mask that makes all 8 network addresses appear to be on same single network How many bits do we need to supernet 8 networks? 2 3 for 8 networks = 3 bits /16 network has a subnet mask of 255.255.0.0 We steal 3 bits from network portion of subnet mask, we end up with the mask 255.248.0.0 Think of it as Shortening the mask

Supernetting http://www.2000trainers.com/cisco-ccna-05/ccna-classlesscidr-supernetting/ So, range can now be designated as 131.0.0.0/13 This value aggregates all IP addresses between 131.0.0.1 and 131.7.255.254

Reserved Addresses Two Reserved Addresses 127.0.0.1 What is this called? 0.0.0.0 Also reserved Can we route to these normally? Blocks of Private Addresses 10.0.0.0/8 (10.0.0.0 to 10.255.255.255) 172.16.0.0/12 (172.16.0.0 to 172.31.255.255) 192.168.0.0/16 (192.168.0.0 to 192.168.255.255) 169.254.0.0/16 (169.254.0.0 to 169.254.255.255) Small companies use: 172.16.0.0 Home users use: 192.168.0.0

Subnet References Packet Fragmentation http://www.cisco.com/en/us/tech/tk827/tk369/technologies_whi te_paper09186a00800d6979.shtml Subnetting http://microcomputer-network.net/calculate-subnet-mask Networking 101 Understanding Subnets http://www.enterprisenetworkingplanet.com/netsp/article.php/3566521/ Networking-101-Understanding-Subnets-and-CIDR.htm More Subnetting http://learn-networking.com/network-design/how-to-subnet-anetwork Subnetting Made Easy http://www.techexams.net/forums/ccna-ccent/38772- subnetting-made-easy.html

DHCP NAT and DHCP Helping with IP Address Shortage

NAT Network Address Translation NAT developed by Cisco Documented in RFC 1631, 1994 http://www.internetsociety.org/articles/retrospective-view-nat Three Types of NAT Static 1 to 1 mapping of internal to external address (won't cover this) Dynamic Internal mapped to a pool of external addresses Overloading or Port Addressing Multiple internal mapped to 1 external address

NAT Dynamic Internal network has internal IP numbers not from IANA These numbers are non-routable Internal computer wants to talk to web-server Router puts Internal IP in an Address Translation Table (ATT) Router maps internal IP to external IP from pool Incoming traffic is mapped back to Internal IP address according to ATT 63

Example of Dynamic NAT Scenario: Corporate network has many hosts but small number of public IP addresses NAT solution Corporate network has private addresses NAT device, located at boundary between corporate and public Internet, manages a pool of public IP addresses When corporate network host sends IP datagram to host in public Internet, NAT device picks public IP address from address pool, and binds this address to private address of host 64

65 Pooling of IP addresses Private Network Internet Host Source = 10.0.1.2 Destination = 64.236.24.4 private address: 10.0.1.2 public address: 128.143.71.21 Source = 10.0.1.2 128.59.16.21 Destination = 64.236.24.4 Private Address NAT Device Public Address 10.0.1.2 128.59.16.21 Source = 128.59.16.21 Destination = 64.236.24.4 Public Host 64.236.24.4 128.59.16.22 128.59.16.23 128.59.16.24 Pool of Ip Addresses

Overloading NAT Translation Table also saves port numbers Port numbers are saved from internal computers Port number + IP address now distinguishes internal computers All internal computers are mapped to a single external IP address 66

Overloading NAT Example Also called Network Address and Port Translation (NAPT), Port Address Translation (PAT) Scenario Single public IP address is mapped to multiple hosts in a private network NAT solution Assign private addresses to the hosts of the corporate network NAT device modifies the port numbers for outgoing traffic 67

68 NAT Overloading Private Network Internet Source = 10.0.1.2 Destination = 64.236.24.4 Source = 10.0.1.2 128.143.71.21 Destination = 64.236.24.4 Source = 128.143.71.21 Destination = 64.236.24.4 private address: 10.0.1.2 public address: 128.143.71.21 NAT Device Host Source = 64.236.24.4 Destination = 10.0.0.2 Source = 64.236.24.4 Destination = 128.59.16.21 10.0.0.2 Source = 64.236.24.4 Destination = 128.59.16.21 Public Host 64.236.24.4 Private Address Public Address 10.0.1.1 128.59.16.21 NAT device stores address and port translation tables In this example we mapped only addresses.

69 PAT Port Address Translation PAT modifies the TCP/UDP source port to track inside Host addresses. Tracks and translates SrcAddr, DstAddr and SrcPort (which uniquely identifies each connection) for each stream of traffic.

NAT Discussion NAT is good for Saving IP addresses Hiding internal IP addresses from outside Functions like a crude firewall Do not rely on NAT for your security!!! Load balancing between servers NAT has some problems Has to recalculate headers and checksum Breaks the end-to-end model of the TCP/IP stack computer to computer Fragments must be carefully dealt with 70

Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable IP addresses are assigned on-demand Avoid manual IP configuration Support mobility of laptops Wireless networking and Home NATs 71

Dynamic Host Configuration Protocol (DHCP) Designed in 1993 Requires a server and free IP address space Supports temporary allocation ( leases ) of IP addresses DHCP client keeps address for a short time DHCP operates in most wireless routers How internal IP addresses distributed Reference http://www.thegeekstuff.com/2013/03/dhcp-basics/ 72

DHCP Overview 1.Devices reach out to local network to discover any available DHCP server 2.Servers manage pools of valid addresses and assign addresses out of those pools 3.DHCP uses idea of leasing - time when IP address will be valid - Lease time can vary depending on how long user is likely to require Internet connection 1.Devices release addresses when their leases expire, request renewal from DHCP server if they are staying online 73

DHCP Message Type Message type is sent as an option = Value Message Type 1 DHCPDISCOVER 2 DHCPOFFER 3 DHCPREQUEST 4 DHCPDECLINE 5 DHCPACK 6 DHCPNAK 7 DHCPRELEASE 8 DHCPINFORM 74

More on DHCP operations Begins with DHCP Discover from client DHCP Offer from a DHCP Server DHCP Request accepts offer DHCP Ack from server Example follows 75

DHCP operations S C Src: 0.0.0.0 Dest: 255.255.255.255 DHCPDISCOVERY Yiaddr: 0.0.0.0 Transaction ID: 654 Src:128.195.31.1 Dest: 255.255.255.255 DHCPOFFER Yiaddr: 128.59.20.147 Transaction ID: 654 Server ID: 128.59.18.1 Lifetime: 3600 secs 76

DHCP Operations Src: 0.0.0.0 Dest: 255.255.255.255 DHCPREQUEST Yiaddr: 128.59.20.147 Transaction ID: 655 server ID: 128.195.31.1 Lifetime: 3600 secs Src:128.59.18.1 Dest: 255.255.255.255 DHCPACK Yiaddr: 128.59.20.147 Transaction ID: 655 Server ID: 128.59.18.1 Lifetime: 3600 secs 77

Routing? Next. Read: Continue with Chapter 4 Lab is on Subnetting is up on the page Assignment UDP Ping Program 78

1

Network Addressing 16

24

Classful Addresses Notes Rigid allocation of networks First 3 bits were fixed, routers easily could tell type of network by first three bits Inverse relationship between network number and number of hosts on network As network number grows, host number shrinks Has to do with how many bits left over for hosts 25

Subnet Mask Want only network portion of IP address Host part will be zero'd out Routers only care about network part IP Address Mask then, is 1's for the network part including subnet 0's for the host part See some examples... 31

Subnets for CIDR Addresses After figuring out the subnetworks base addresses, Figure out the nework mask if you haven't already done that Figure out the broadcast address for each subnetwork Figure out the range of hosts assigned to each subnetwork Worksheet on this, plus lab on subnetting Look at the links for help, end of lecture 51

Reserved Addresses Two Reserved Addresses 127.0.0.1 What is this called? 0.0.0.0 Also reserved Can we route to these normally? Blocks of Private Addresses 10.0.0.0/8 (10.0.0.0 to 10.255.255.255) 172.16.0.0/12 (172.16.0.0 to 172.31.255.255) 192.168.0.0/16 (192.168.0.0 to 192.168.255.255) 169.254.0.0/16 (169.254.0.0 to 169.254.255.255) Small companies use: 172.16.0.0 Home users use: 192.168.0.0 59

DHCP NAT and DHCP Helping with IP Address Shortage 61

NAT Network Address Translation NAT developed by Cisco Documented in RFC 1631, 1994 http://www.internetsociety.org/articles/retrospective-view-nat Three Types of NAT Static 1 to 1 mapping of internal to external address (won't cover this) Dynamic Internal mapped to a pool of external addresses Overloading or Port Addressing Multiple internal mapped to 1 external address 62

NAT Dynamic Internal network has internal IP numbers not from IANA These numbers are non-routable Internal computer wants to talk to web-server Router puts Internal IP in an Address Translation Table (ATT) Router maps internal IP to external IP from pool Incoming traffic is mapped back to Internal IP address according to ATT 63

Example of Dynamic NAT Scenario: Corporate network has many hosts but small number of public IP addresses NAT solution Corporate network has private addresses NAT device, located at boundary between corporate and public Internet, manages a pool of public IP addresses When corporate network host sends IP datagram to host in public Internet, NAT device picks public IP address from address pool, and binds this address to private address of host 64

Pooling of IP addresses Private Network Internet Source = 10.0.1.2 Destination = 64.236.24.4 Source = 10.0.1.2 128.59.16.21 Destination = 64.236.24.4 Source = 128.59.16.21 Destination = 64.236.24.4 Host private address: 10.0.1.2 public address: 128.143.71.21 Private Address NAT Device Public Address 10.0.1.2 128.59.16.21 Public Host 64.236.24.4 128.59.16.22 128.59.16.23 128.59.16.24 Pool of Ip Addresses 65

Overloading NAT Translation Table also saves port numbers Port numbers are saved from internal computers Port number + IP address now distinguishes internal computers All internal computers are mapped to a single external IP address 66

Overloading NAT Example Also called Network Address and Port Translation (NAPT), Port Address Translation (PAT) Scenario Single public IP address is mapped to multiple hosts in a private network NAT solution Assign private addresses to the hosts of the corporate network NAT device modifies the port numbers for outgoing traffic 67

NAT Overloading Private Network Internet Source = 10.0.1.2 Destination = 64.236.24.4 Source = 10.0.1.2 128.143.71.21 Destination = 64.236.24.4 Source = 128.143.71.21 Destination = 64.236.24.4 Host private address: 10.0.1.2 public address: 128.143.71.21 Source = 64.236.24.4 Destination = 10.0.0.2 NAT Device Source = 64.236.24.4 Destination = 128.59.16.21 10.0.0.2 Source = 64.236.24.4 Destination = 128.59.16.21 Public Host 64.236.24.4 Private Address Public Address 10.0.1.1 128.59.16.21 NAT device stores address and port translation tables In this example we mapped only addresses. 68

PAT Port Address Translation PAT modifies the TCP/UDP source port to track inside Host addresses. Tracks and translates SrcAddr, DstAddr and SrcPort (which uniquely identifies each connection) for each stream of traffic. 69

NAT Discussion NAT is good for Saving IP addresses Hiding internal IP addresses from outside Functions like a crude firewall Do not rely on NAT for your security!!! Load balancing between servers NAT has some problems Has to recalculate headers and checksum Breaks the end-to-end model of the TCP/IP stack computer to computer Fragments must be carefully dealt with 70

Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable IP addresses are assigned on-demand Avoid manual IP configuration Support mobility of laptops Wireless networking and Home NATs 71

Dynamic Host Configuration Protocol (DHCP) Designed in 1993 Requires a server and free IP address space Supports temporary allocation ( leases ) of IP addresses DHCP client keeps address for a short time DHCP operates in most wireless routers How internal IP addresses distributed Reference http://www.thegeekstuff.com/2013/03/dhcp-basics/ 72

DHCP Overview 1.Devices reach out to local network to discover any available DHCP server 2.Servers manage pools of valid addresses and assign addresses out of those pools 3.DHCP uses idea of leasing - time when IP address will be valid - Lease time can vary depending on how long user is likely to require Internet connection 1.Devices release addresses when their leases expire, request renewal from DHCP server if they are staying online 73

DHCP Message Type Message type is sent as an option = Value Message Type 1 DHCPDISCOVER 2 DHCPOFFER 3 DHCPREQUEST 4 DHCPDECLINE 5 DHCPACK 6 DHCPNAK 7 DHCPRELEASE 8 DHCPINFORM 74

More on DHCP operations Begins with DHCP Discover from client DHCP Offer from a DHCP Server DHCP Request accepts offer DHCP Ack from server Example follows 75

DHCP operations S C Src: 0.0.0.0 Dest: 255.255.255.255 DHCPDISCOVERY Yiaddr: 0.0.0.0 Transaction ID: 654 Src:128.195.31.1 Dest: 255.255.255.255 DHCPOFFER Yiaddr: 128.59.20.147 Transaction ID: 654 Server ID: 128.59.18.1 Lifetime: 3600 secs 76

DHCP Operations Src: 0.0.0.0 Dest: 255.255.255.255 DHCPREQUEST Yiaddr: 128.59.20.147 Transaction ID: 655 server ID: 128.195.31.1 Lifetime: 3600 secs Src:128.59.18.1 Dest: 255.255.255.255 DHCPACK Yiaddr: 128.59.20.147 Transaction ID: 655 Server ID: 128.59.18.1 Lifetime: 3600 secs 77